Skip to main content

A PUF-Based Destructive Private Mutual Authentication RFID Protocol

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11359))

Abstract

We propose the first stateful RFID protocol that offers mutual authentication and provides destructive privacy, in the Vaudenay model. In order to achieve destructive privacy we use Physically Unclonable Functions (PUFs) to assure that the internal secret of the tag remains hidden against an adversary with invasive capabilities. The proposed protocol avoids the use of pseudo random generators on tags, and provides scalability by offering a constant authentication time. For the mitigation of desynchronization attacks we propose a mechanism, on reader level, that thwarts them.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Contraction from transmitter and receiver.

  2. 2.

    Contraction from transmitter and responder.

References

  1. Akgün, M., Çaglayan, M.U.: Providing destructive privacy and scalability in RFID systems using PUFs. Ad Hoc Netw. 32(C), 32–42 (2015)

    Article  Google Scholar 

  2. Arslan, A., Kardaş, S., Çolak, S.A., Ertürk, S.: Are RNGs Achilles’ heel of RFID security and privacy protocols? Wirel. Pers. Commun. 100(4), 1355–1375 (2018)

    Article  Google Scholar 

  3. Avoine, G., Carpent, X., Martin, B.: Strong authentication and strong integrity (SASI) is not that strong. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 50–64. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-16822-2_5

    Chapter  Google Scholar 

  4. Avoine, G., Coisel, I., Martin, T.: Time measurement threatens privacy-friendly RFID authentication protocols. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 138–157. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-16822-2_13

    Chapter  Google Scholar 

  5. Bringer, J., Chabanne, H., Icart, T.: Improved privacy of the tree-based hash protocols using physically unclonable function. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 77–91. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85855-3_6

    Chapter  Google Scholar 

  6. Canard, S., Coisel, I.: Data synchronization in privacy-preserving RFID authentication schemes. In: Conference on RFID Security (2008)

    Google Scholar 

  7. Canard, S., Coisel, I., Etrog, J., Girault, M.: Privacy-preserving RFID systems: model and constructions (2010). https://eprint.iacr.org/2010/405.pdf

  8. Hermans, J., Pashalidis, A., Vercauteren, F., Preneel, B.: A new RFID privacy model. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 568–587. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23822-2_31

    Chapter  Google Scholar 

  9. Hermans, J., Peeters, R., Preneel, B.: Proper RFID privacy: model and protocols. IEEE Trans. Mobile Comput. 13(12), 2888–2902 (2014)

    Article  Google Scholar 

  10. Kardaş, S., Çelik, S., Yildiz, M., Levi, A.: PUF-enhanced offline RFID security and privacy. J. Netw. Comput. Appl. 35(6), 2059–2067 (2012)

    Article  Google Scholar 

  11. Kardaş, S., Kiraz, M.S., Bingöl, M.A., Demirci, H.: A novel RFID distance bounding protocol based on physically unclonable functions. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 78–93. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-25286-0_6

    Chapter  Google Scholar 

  12. Maes, R.: Physically Unclonable Functions: Constructions, Properties and Applications. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41395-7

    Book  MATH  Google Scholar 

  13. Paise, R.-I., Vaudenay, S.: Mutual authentication in RFID: security and privacy. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, pp. 292–299. ACM, New York (2008)

    Google Scholar 

  14. Peris-Lopez, P., Hernandez-Castro, J.C., Tapiador, J.M.E., Ribagorda, A.: Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol. 5379, pp. 56–68. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00306-6_5

    Chapter  Google Scholar 

  15. Sadeghi, A.-R., Visconti, I., Wachsmann, C.: Enhancing RFID security and privacy by physically unclonable functions. In: Sadeghi, A.R., Naccache, D. (eds.) Towards Hardware-Intrinsic Security. Information Security and Cryptography, pp. 281–305. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14452-3_13

    Chapter  Google Scholar 

  16. Sadeghi, A.-R., Visconti, I., Wachsmann, C.: PUF-enhanced RFID security and privacy. In: Workshop on Secure Component and System Identification (SECSI), vol. 110 (2010)

    Google Scholar 

  17. Sipser, M.: Introduction to the Theory of Computation. Cengage Learning, Boston (2012)

    MATH  Google Scholar 

  18. Van Deursen, T., Radomirovic, S.: Attacks on RFID protocols (2008). http://eprint.iacr.org/2008/310

  19. Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68–87. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-76900-2_5

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ferucio Laurenţiu Ţiplea .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hristea, C., Ţiplea, F.L. (2019). A PUF-Based Destructive Private Mutual Authentication RFID Protocol. In: Lanet, JL., Toma, C. (eds) Innovative Security Solutions for Information Technology and Communications. SECITC 2018. Lecture Notes in Computer Science(), vol 11359. Springer, Cham. https://doi.org/10.1007/978-3-030-12942-2_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-12942-2_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-12941-5

  • Online ISBN: 978-3-030-12942-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics